GCVE-VVD-MAGEIA-2017-381
Advisory Published
Vulnetix · Advisory published October 19, 2017
This kernel update is based on upstream 4.9.56 and fixes at least the following security issues: A flaw was found in the way the Linux KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest (CVE-2017-7518). A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace (CVE-2017-7558). A security flaw was discovered in nl80211_set_rekey_data() function in the Linux kernel since v3.1-rc1 through v4.13. This function does not check whether the required attributes are present in a netlink request. This request can be issued by a user with CAP_NET_ADMIN privilege and may result in NULL dereference and a system crash (CVE-2017-12153). Linux kernel built with the KVM visualization support (CONFIG_KVM), with nested visualization (nVMX) feature enabled (nested=1), is vulnerable to a crash due to disabled external interrupts. As L2 guest could acce s (r/w) hardware CR8 register of the host(L0). In a nested visualization setup, L2 guest user could use this flaw to potentially crash the host(L0) resulting in DoS (CVE-2017-12154). The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (CVE-2017-14106). The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes (CVE-2017-14156). It was found that the iscsi_if_rx() function in scsi_transport_iscsi.c in the Linux kernel since v2.6.24-rc1 through 4.13.2 allows local users to cause a denial of service (a system panic) by making a number of certain syscalls by leveraging incorrect length validation in the kernel code (CVE-2017-14489). The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0 (CVE-2017-14991). The tpacket_rcv() function in 'net/packet/af_packet.c' file in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls (CVE-2017-14497). A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (>1024) index value (CVE-2017-1000252). For other upstream fixes in this update, read the referenced changelogs.

Affected Products

VendorProductVersionsPlatforms
Mageiakernel-userspace-headers0 (affected), 4.9.56-1.mga6 (unaffected)
Mageiakernel0 (affected), 4.9.56-1.mga6 (unaffected)
Mageiakmod-virtualbox0 (affected), 5.1.26-6.mga6 (unaffected)
Mageiakmod-xtables-addons0 (affected), 2.12-46.mga6 (unaffected)
Mageiakmod-vboxadditions0 (affected), 5.1.26-6.mga6 (unaffected)

Aliases

Transitive aliases

VVD-MAGEIA-2017-384ALAS2-2018-1058GHSA-mmph-rg95-j757VVD-MAGEIA-2018-418SUSE-SU-2018:2961-1VVD-MAGEIA-2017-472EUVD-2017-4598EUVD-2017-9003GSD-2017-17863EUVD-2017-8999GHSA-rgw3-fq9h-vvg7GHSA-87xr-wmm8-4mx3VVD-MAGEIA-2018-64EUVD-2017-6725GHSA-ggjw-r373-gj64CVE-2018-14633GHSA-wxv4-3q58-w3mxEUVD-2016-0812EUVD-2018-11754EUVD-2017-4732GHSA-fwvw-9m43-mj3mcisco-sa-20171016-wpaCVE-2018-14634GHSA-5fh3-v3jw-rc9hGHSA-mw8q-cf75-7f35EUVD-2018-1874CNVD-2018-07889EUVD-2018-11720CVE-2017-17863VVD-MAGEIA-2018-323GHSA-p984-v28j-p56qCNVD-2017-30397GHSA-fx3c-8pqx-5v4cEUVD-2017-18352GHSA-752f-2m5c-7473CVE-2018-1118VVD-MAGEIA-2017-383EUVD-2018-2941BDU:2019-01058CVE-2018-7995CVE-2018-10901ALAS2-2018-971SUSE-SU-2018:2787-1SUSE-SU-2018:2776-1GHSA-q7q6-h2q3-86p9CVE-2018-15594EUVD-2017-4595BDU:2019-01054CVE-2018-10840CVE-2017-17862GHSA-v67j-hmh5-9qhgCVE-2017-13086CVE-2018-17182GHSA-mxrv-cp62-8842VVD-MAGEIA-2018-324ALAS-2018-971CVE-2017-17854CVE-2017-0561BDU:2017-02265BDU:2019-01057EUVD-2018-2943ALAS-2018-1023CVE-2018-1068GHSA-9jqj-q3v6-cv9hCVE-2018-10675BDU:2017-00893GHSA-vhcx-55j8-pv9cCVE-2018-3620SUSE-SU-2018:1048-1GHSA-2jfx-4v33-68mfEUVD-2017-5992CVE-2017-17856CNVD-2017-30403CVE-2017-13082CVE-2018-5390GHSA-f9jm-8gc5-4v7gCVE-2018-8897GSD-2018-1091CVE-2017-17855ALAS2-2018-994BDU:2019-02397RHSA-2019:0641CNVD-2018-17431GSD-2018-10902SUSE-SU-2018:3084-1EUVD-2018-15469CVE-2017-13077CVE-2018-10883EUVD-2017-4606EUVD-2018-2922CVE-2018-1000199GHSA-289m-2pf5-x59pSUSE-SU-2018:2962-1EUVD-2017-9001CVE-2018-10881CVE-2018-10902GHSA-f8g5-rmc4-j74gALAS-2019-1280GHSA-qwp3-c8jm-p6v6EUVD-2018-2959EUVD-2018-20505CVE-2018-14617VVD-MAGEIA-2018-374GHSA-68p5-hvhw-rpc8GHSA-fr39-wf38-f5w3VVD-MAGEIA-2017-388GHSA-hwr9-p63p-wq87CVE-2017-17864CVE-2017-13084GHSA-wjj9-4g79-4c2cGHSA-6q2v-x4cv-ghqxEUVD-2018-2945CVE-2018-18445GHSA-2wr3-w5rh-2qx4GHSA-fr9c-f69x-fpvfCNVD-2017-30406GHSA-gwvj-5r5w-vc2gRHSA-2019:0415EUVD-2018-7349SUSE-SU-2018:3029-1CVE-2017-13088EUVD-2017-4604EUVD-2017-4599BDU:2019-02512VVD-MAGEIA-2018-419CVE-2018-13405CVE-2017-17853GHSA-v788-jmxr-wgj9CVE-2017-16996EUVD-2017-9010CVE-2018-5391GHSA-qvr8-f9g3-wv5xGHSA-rm5p-g62j-4fc3GHSA-fw8c-q6fq-37rgSUSE-SU-2018:2862-1SUSE-SU-2021:0452-1VVD-MAGEIA-2018-62CVE-2018-10876CVE-2018-14734EUVD-2018-4857CNVD-2018-03941GHSA-4jqv-ffjp-jw6vGHSA-9w6j-7396-jgw4CVE-2017-13078EUVD-2017-0915VVD-MAGEIA-2018-341CVE-2018-12896GHSA-p95m-33p3-2qfrCVE-2017-13215SUSE-SU-2018:2539-1GHSA-mxm3-6wfv-q9qgGHSA-843x-7h9r-xpf8BDU:2017-02271CVE-2018-3646GHSA-p6x5-xg7h-fj5hEUVD-2018-6572EUVD-2017-8108EUVD-2018-6541CVE-2017-0786GHSA-45mv-5p9c-6w7cCVE-2018-10880EUVD-2017-4596CVE-2018-20856EUVD-2018-20957VVD-MAGEIA-2018-417GHSA-gffw-ppmc-p7r6EUVD-2017-9469CNVD-2017-30398GHSA-gh8r-7rf7-w4rgEUVD-2017-4600GHSA-gcfj-hpmm-x9xfALAS-2018-1049EUVD-2018-10016GHSA-xpjw-vcgc-qx6pVVD-MAGEIA-2018-63GHSA-j9fr-8f9m-c9qcCVE-2018-10878ALAS-2018-1048EUVD-2018-2944EUVD-2018-7468BDU:2019-02508EUVD-2018-11762EUVD-2017-1513GHSA-pvv9-p2gj-w426VVD-MAGEIA-2018-373EUVD-2018-2992EUVD-2018-18307GHSA-229x-53vm-m4f4CVE-2017-12188H1-286740EUVD-2017-8163CVE-2018-13093CNVD-2017-30399GHSA-9pwc-v5p9-3c37EUVD-2018-8956EUVD-2018-17160VVD-CERTCC-2017-228519CVE-2016-0801EUVD-2017-4605BDU:2019-01056EUVD-2018-6524CVE-2018-14641BDU:2019-01344CVE-2017-15265CVE-2017-13081BDU:2019-01055SUSE-SU-2018:2940-1GHSA-xfrv-5h7j-4qvxVVD-MAGEIA-2017-379EUVD-2017-8164CNVD-2017-30402GHSA-jw6w-m4jf-m6xpVVD-MAGEIA-2018-296GHSA-qv83-77rj-635jEUVD-2017-5618VVD-MAGEIA-2017-386GHSA-r277-gjg9-h48hCVE-2018-10940EUVD-2018-19707GHSA-cr4j-59jc-xqhgCVE-2018-16658BDU:2019-02783EUVD-2017-9348GHSA-8x9x-6w2w-w9h8CVE-2017-16995EUVD-2018-4849BDU:2019-00979EUVD-2018-10173BDU:2017-02272BDU:2017-02269CNVD-2017-30400GHSA-jrh4-2f65-vc34EUVD-2018-2946EUVD-2018-17161GHSA-vx6h-cqmq-qj84SUSE-SU-2018:2775-1EUVD-2017-3737CVE-2018-10879GHSA-4994-8w6g-9jvwGHSA-88jq-244c-4xj3EUVD-2017-4597BDU:2021-01420EUVD-2018-11737CVE-2017-18344CVE-2017-9417CVE-2018-6555BDU:2021-01418GHSA-grv8-gqh3-fmc9BDU:2020-00735EUVD-2018-15500VVD-MAGEIA-2017-387GHSA-8r3h-6rgp-rrqmEUVD-2018-6536EUVD-2018-8128GHSA-rhjq-jcf3-f32gCVE-2018-12904EUVD-2018-2909GHSA-h9mf-j5vf-pc99BDU:2021-01436BDU:2019-00977EUVD-2018-13396SUSE-SU-2018:1217-1CVE-2018-6554EUVD-2017-4602ALAS2-2018-1086EUVD-2018-8460CVE-2018-6412GSD-2018-6412SUSE-SU-2018:2960-1EUVD-2017-5667GHSA-55f7-p7jv-3448EUVD-2018-6537ALAS2-2018-1050ALAS2-2019-1281EUVD-2017-3763BDU:2019-00978CVE-2018-1108CVE-2018-9363CVE-2018-3615BDU:2019-03124GHSA-c688-2x49-65h9BDU:2017-01325VVD-MAGEIA-2018-340CVE-2018-14678CVE-2018-1091GHSA-2gc2-cm86-3pjxSUSE-SU-2018:2963-1BDU:2019-01059EUVD-2018-18306VVD-MAGEIA-2018-337GHSA-jq36-53qv-7v3mEUVD-2017-9009BDU:2017-02263GHSA-3xm5-vf98-cwqxGHSA-3rm8-9cxg-8m49GHSA-h6c2-frm7-53hmBDU:2017-02266GHSA-9x5q-ww2j-jw9xCVE-2017-13079CVE-2018-10877ALAS2-2018-1051EUVD-2018-2746CVE-2017-16939GHSA-8j5h-gvcc-pfhwEUVD-2017-16535EUVD-2017-9004BDU:2017-02270ALAS-2018-1058CVE-2018-15471GHSA-9c72-6vp8-jx77BDU:2017-02264CNVD-2017-14425CVE-2017-17852GHSA-cc5r-x8fh-jwv3EUVD-2018-5042CVE-2018-10882GHSA-88p5-45fx-5x87EUVD-2018-18169EUVD-2017-9011GHSA-mq9x-53x3-39h5GHSA-qj7r-58vw-6wwwCVE-2018-15572SUSE-SU-2018:2864-1CNVD-2017-38518CVE-2018-10853CNVD-2017-30404CVE-2018-13094CVE-2017-18216EUVD-2018-5043EUVD-2018-11741VVD-MAGEIA-2018-391EUVD-2017-9002BDU:2017-02268EUVD-2018-5348GHSA-5qx2-85hg-v5crSUSE-SU-2018:2858-1GHSA-873h-38h4-56jxGHSA-j2cv-h77g-5p95BDU:2017-02267EUVD-2018-6620CVE-2018-1087CVE-2018-18281EUVD-2018-15474GHSA-j658-wqr4-q3w7BDU:2019-01060EUVD-2018-2947EUVD-2018-2942GHSA-84fm-f9m3-wc94CVE-2017-17857GHSA-fhr3-fj6p-xhpfALAS2-2018-1023EUVD-2018-2958EUVD-2017-9000CVE-2017-13087CVE-2018-16276GHSA-hwv5-xg68-86fhALAS2-2019-1280BDU:2021-01415GHSA-496w-f8vc-3275VVD-MAGEIA-2017-463CVE-2017-13080GHSA-899p-w494-v855ALAS-2018-1086SUSE-SU-2018:2538-1CNVD-2017-30405CNVD-2017-30401GHSA-4hq8-f3mj-m9wcEUVD-2018-2940EUVD-2018-7446SUSE-SU-2018:2860-1VVD-MAGEIA-2017-467EUVD-2017-1140ALAS-2018-1087GHSA-c3vm-qh5c-27gqGHSA-5p56-pcgw-42mfVVD-MAGEIA-2017-466

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.